SlideShare a Scribd company logo
1 of 3
Download to read offline
Multilayered Email and Web Protection                                                                                            Customer Case Study




Proactive security solution helps Noble Foods optimise supply chain and IT operations.

                                                                  Challenge
  EXECUTIVE SUMMARY
                                                                  Noble Foods is the United Kingdom’s largest egg supplier and, following the launch of
                                                                  its Happy Egg brand, the world’s number-one free-range egg producer. With 650
  Customer Name: Noble Foods
                                                                  users based across seven divisions, the company’s operations cover the complete
  Industry: Food Production/Agriculture/Retail
                                                                  hen lifecycle: from breeding and rearing, selling the birds to farms and egg shelling
  Location: United Kingdom                                        and packing, through to the production of liquid and cooked eggs, hen disposal,
                                                                  and milling.
  Company size: 1800 employees
                                                                  This success has been achieved largely through a sustained program of
  Challenge
                                                                  organic growth and acquisitions. For example, Noble continues to diversify into
  •	Reduce spam levels without delaying
    legitimate email
                                                                  value-added fresh food categories by investing in dessert companies with attractive
                                                                  growth potential.
  •	Promote safer web and email behavior
    across company                                                With operations spread across 42 sites throughout England, Scotland, Wales, and
                                                                  France, the company relies heavily on its Cisco IP network to optimize all points
  Solution
                                                                  of its supply chain with effective communications and, in particular, an efficient
  •	Intelligent pre-gateway filtering solution,
    based on the Cisco IronPort Email and Web                     email system.
    Security Appliances integrated with the
                                                                  “We centralized IT around four years ago and run all our operations out of a central
    Sawmill Enterprise 5 Reporting tool
                                                                  data center using Citrix technology to deliver applications over a Cisco MultiProtocol
  Results                                                         Label Switching (MPLS) network,” says Ben Gordon, IT Infrastructure Manager for
  •	Over 2 million threats blocked and 99.3                       Noble Foods.
    percent less spam in first six months
  •	Less risk of delays to legitimate email
                                                                  With malware and spyware attacks on the rise, the company began to experience
                                                                  problems with excessively high levels of bogus emails. “We were receiving upward
  •	80 percent decline in spam and virus related
    IT Service Desk calls, releasing IT to focus                  of 5000 unsolicited emails a day, which created a lot of frustration with users,”
    more on business enablement projects                          says Gordon. “To make matters worse, people were also losing legitimate emails,
                                                                  because they contained words and images with pornographic connotations and
                                                                  were, therefore, being incorrectly filtered as spam.”

The situation was compounded by three separate antispam and web-filtering solutions. Designed to solve threats as they
developed, these entry-level products had been built using various proprietary technologies and open-source software and,
as a result, operated in isolation rather than working together as part of one cohesive, enterprise wide security system.

“Often we could spend the whole day dealing with spam issues, which for a small IT team serving 650 users was not
sustainable,” says Gordon.




© 2011 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.                                             Page 1 of 3
Customer Case Study


“We needed an intelligent                                         Solution
 pre-gateway filtering                                            The company’s response was to move from a reactive approach that focused
                                                                  solely on containing threats once they had passed through the firewall, to a
 solution that would make it
                                                                  proactive one that assessed and removed risks, in real-time before they could
 easier to enforce policies                                       penetrate the network perimeter.
 and to protect users,
                                                                  “We needed an intelligent pre-gateway filtering solution that would make it easier
 without being overzealous
                                                                  to enforce policies and to protect users, without being overzealous and bringing
 and bringing the business                                        the business to a grinding halt,” says Gordon.
 to a grinding halt.”
                                                                  After extensively researching the market, Noble Foods formed a shortlist headed
                                                                  by Cisco IronPort™ solutions. “IronPort’s reputation, plus the fact that they were
Ben Gordon                                                        now part of Cisco, effectively offered two market leaders for the price of one,”
IT Infrastructure Manager
                                                                  says Gordon. “Even so, we were still looking for candid advice rather than just a
Noble Foods
                                                                  sales team simply looking to close a deal.”

                                                                  Cisco Security assembled a team of network, email, and web security experts, who
                                                                  worked closely with Noble’s IT team to identify potential vulnerabilities and scope
                                                                  requirements, before helping to plan, design, and implement the new platform.

                                                                  This advanced security solution, comprising Cisco® IronPort Email Security and
                                                                  Web Security Appliances, allows the company to benefit from the latest advances
                                                                  in threat detection and prevention. These innovations include:

                                                                  •	 Dynamic Vectoring and Streaming engine: a revolutionary scanning tool for
                                                                     signature-based spyware and malware filtering
                                                                  •	 Cisco Security Intelligence Operations (SIO): a combination of threat telemetry,
                                                                     a team of global research engineers, and sophisticated security modeling. SIO
                                                                     also includes SenderBase: a threat-tracking database that captures Internet traffic
                                                                     patterns and data from over 100,000 organizations worldwide
                                                                  •	 Pre-eXecution Environment (PXE) technology: industry-leading email encryption
                                                                     for helping ensure secure messaging compliance and regulatory requirements.

                                                                  As the project progressed, its focus widened when Noble’s HR department saw an
                                                                  opportunity to improve monitoring and governance of web usage across the company.

                                                                  Taking these new requirements, Cisco Security was able to integrate the Sawmill
                                                                  Enterprise 5 Reporting tool with the new security platform. As well as providing the
                                                                  ability to restrict inappropriate emails and visits to specific websites, the solution
                                                                  empowers HR to set up their own automated reports, drill down, and take appropriate
                                                                  corrective action.

                                                                  “For such a high-profile project, the migration was remarkably smooth and largely
                                                                  invisible to end users,” says Gordon. “Best of all, because the Cisco Security solutions
                                                                  are simple ‘plug and play,’ they required minimal configuration and maintenance.”

                                                                  Results
                                                                  Implementing the Cisco Security solutions has enabled Noble Foods to strengthen
                                                                  its web and email defences in a number of ways.

                                                                  Suspicious traffic and potential threats are now automatically intercepted in the
                                                                  cloud before they can reach the desktop. This proactive approach is supported by
                                                                  the SIO, which receives over 30 billion queries daily and increases malware catch
                                                                  rates by more than 20 percent over signature-based scanning-only products. In
                                                                  the first six months, Noble isolated over 2 million malicious threats and cut spam
                                                                  levels by 99.3 percent.




© 2011 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information..                                              Page 2 of 3
Customer Case Study


“Calls to our IT Service                                          Employees are more aware of their responsibilities for safe Internet use. IT security
 Desk have dropped by                                             policy has been underpinned by the ability to easily and rapidly block websites
                                                                  frequently targeted by malware and spyware producers. “The Cisco IronPort solution
 80 percent. Overall, we                                          gives us much greater control,” says Gordon. “For example, remote workers at a
 hardly spend anytime                                             production site can use PCs located in the Internet cafe during their breaks. The
 fire-fighting security                                           system will let them visit certain social networking sites during specific hours, but
 problems, which means                                            prevents the use of bandwidth-hungry video flash games, thereby protecting the
 we can concentrate on                                            6Mbps network link.”
 planning and delivering                                          There is now less risk of legitimate email that could contain customer orders,
 projects that will add                                           breeder data, agreements, or documentation ending up in quarantine.
 increased value to the                                           “We’ve seen a 75 percent reduction in false positives, which are instances when
 business.”                                                       the scanner incorrectly thinks it has found a specific vulnerability,” says Gordon. “In
                                                                  layman’s terms, this means more ‘good’ email is getting through the system, which
                                                                  means our supply chain can function more effectively and efficiently. If there are any
Ben Gordon
IT Infrastructure Manager
                                                                  problems, our system even flags these to our users who are empowered to release
Noble Foods                                                       certain types of mail themselves.”

                                                                  The project has also been good news for Noble’s IT team. “Calls to our IT Service
                                                                  Desk have dropped by 80 percent,” says Gordon. “Overall, we hardly spend anytime
                                                                  fire-fighting security problems, which means we can concentrate on planning and
                                                                  delivering projects that will add increased value to the business.”

                                                                  Next Steps
                                                                  Noble Foods is already looking to enhance operations and simplify IT further still.
                                                                  As part of a phased approach, the company plans to replace aging private branch
                                                                  exchange (PBX) systems with Cisco IP Telephony, initially at its larger sites. The
                                                                  project is expected to improve collaboration and productivity, while saving money
                                                                  on calls and maintenance.



                                                                  PRODUCT LIST
                                                                  Security	and	VPN
                                                                  •	Cisco IronPort C160 Email Security Appliance
                                                                  •	Cisco IronPort S160 Web Security Appliance
                                                                  •	Web, email, and image analysis licensing

                                                                  Services
                                                                  •	Cisco Security Consultancy
                                                                  •	Integration with Sawmill Enterprise 5 Reporting tool




Americas Headquarters                                   Asia Pacific Headquarters                      Europe Headquarters
Cisco Systems, Inc.                                     Cisco Systems (USA) Pte. Ltd.                  Cisco Systems International BV Amsterdam,
San Jose, CA                                            Singapore                                      The Netherlands

Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco Website at www.cisco.com/go/offices.

Cisco and the Cisco Logo are trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and other countries. A listing of Cisco's trademarks can be found at
www.cisco.com/go/trademarks. Third party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a
partnership relationship between Cisco and any other company. (1005R)

© 2011 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information..             Printed in the UK      ES/11587/0611         Page 3 of 3

More Related Content

What's hot

Comprompt Solutions LLP Presentation Slides
Comprompt Solutions LLP Presentation SlidesComprompt Solutions LLP Presentation Slides
Comprompt Solutions LLP Presentation SlidesWebtech Comprompt
 
Cisco tec rob soderbery - core enterprise networking
Cisco tec   rob soderbery - core enterprise networkingCisco tec   rob soderbery - core enterprise networking
Cisco tec rob soderbery - core enterprise networkingCisco Public Relations
 
Cisco tec de beer, andersen, o'sullivan - video & collaboration
Cisco tec   de beer, andersen, o'sullivan - video & collaborationCisco tec   de beer, andersen, o'sullivan - video & collaboration
Cisco tec de beer, andersen, o'sullivan - video & collaborationCisco Public Relations
 
Simplificando el Contact Center en una sola plataforma de Colaboración
Simplificando el Contact Center en una sola plataforma de ColaboraciónSimplificando el Contact Center en una sola plataforma de Colaboración
Simplificando el Contact Center en una sola plataforma de ColaboraciónMundo Contact
 
Cisco tec chris young - security intelligence operations
Cisco tec   chris young - security intelligence operationsCisco tec   chris young - security intelligence operations
Cisco tec chris young - security intelligence operationsCisco Public Relations
 
Virtela Corp Brochure
Virtela Corp BrochureVirtela Corp Brochure
Virtela Corp Brochuretmcleland
 
Laser Pioneer Secures Network End-to-End to Protect Assets
Laser Pioneer Secures Network End-to-End to Protect AssetsLaser Pioneer Secures Network End-to-End to Protect Assets
Laser Pioneer Secures Network End-to-End to Protect AssetsCisco Security
 
Cisco tec surya panditi - service provider
Cisco tec   surya panditi - service providerCisco tec   surya panditi - service provider
Cisco tec surya panditi - service providerCisco Public Relations
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckArrow ECS UK
 
AMAG Pharmaceuticals Success Story
AMAG Pharmaceuticals Success StoryAMAG Pharmaceuticals Success Story
AMAG Pharmaceuticals Success StoryImprivata
 
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...Arrow ECS UK
 
Increasing Security while Decreasing Costs when Virtualizing In-Scope Servers:
Increasing Security while Decreasing Costs when Virtualizing In-Scope Servers:Increasing Security while Decreasing Costs when Virtualizing In-Scope Servers:
Increasing Security while Decreasing Costs when Virtualizing In-Scope Servers:HyTrust
 
Intel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfeeIntel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfeeIntelAPAC
 
Building a Strong Foundation for Your Cloud with Identity Management
Building a Strong Foundation for Your Cloud with Identity ManagementBuilding a Strong Foundation for Your Cloud with Identity Management
Building a Strong Foundation for Your Cloud with Identity ManagementNishant Kaushik
 
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance MandatesSecure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance MandatesHyTrust
 

What's hot (19)

Comprompt Solutions LLP Presentation Slides
Comprompt Solutions LLP Presentation SlidesComprompt Solutions LLP Presentation Slides
Comprompt Solutions LLP Presentation Slides
 
Cisco tec rob soderbery - core enterprise networking
Cisco tec   rob soderbery - core enterprise networkingCisco tec   rob soderbery - core enterprise networking
Cisco tec rob soderbery - core enterprise networking
 
Cisco tec de beer, andersen, o'sullivan - video & collaboration
Cisco tec   de beer, andersen, o'sullivan - video & collaborationCisco tec   de beer, andersen, o'sullivan - video & collaboration
Cisco tec de beer, andersen, o'sullivan - video & collaboration
 
Simplificando el Contact Center en una sola plataforma de Colaboración
Simplificando el Contact Center en una sola plataforma de ColaboraciónSimplificando el Contact Center en una sola plataforma de Colaboración
Simplificando el Contact Center en una sola plataforma de Colaboración
 
Cisco tec chris young - security intelligence operations
Cisco tec   chris young - security intelligence operationsCisco tec   chris young - security intelligence operations
Cisco tec chris young - security intelligence operations
 
Virtela Corp Brochure
Virtela Corp BrochureVirtela Corp Brochure
Virtela Corp Brochure
 
Laser Pioneer Secures Network End-to-End to Protect Assets
Laser Pioneer Secures Network End-to-End to Protect AssetsLaser Pioneer Secures Network End-to-End to Protect Assets
Laser Pioneer Secures Network End-to-End to Protect Assets
 
Alta 3-2013
Alta 3-2013Alta 3-2013
Alta 3-2013
 
Cisco tec surya panditi - service provider
Cisco tec   surya panditi - service providerCisco tec   surya panditi - service provider
Cisco tec surya panditi - service provider
 
Dataplex Company Overview
Dataplex Company OverviewDataplex Company Overview
Dataplex Company Overview
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
 
AMAG Pharmaceuticals Success Story
AMAG Pharmaceuticals Success StoryAMAG Pharmaceuticals Success Story
AMAG Pharmaceuticals Success Story
 
Security Intelligence
Security IntelligenceSecurity Intelligence
Security Intelligence
 
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...
 
Bridgeworks IT Solutions 2013
Bridgeworks IT Solutions 2013Bridgeworks IT Solutions 2013
Bridgeworks IT Solutions 2013
 
Increasing Security while Decreasing Costs when Virtualizing In-Scope Servers:
Increasing Security while Decreasing Costs when Virtualizing In-Scope Servers:Increasing Security while Decreasing Costs when Virtualizing In-Scope Servers:
Increasing Security while Decreasing Costs when Virtualizing In-Scope Servers:
 
Intel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfeeIntel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfee
 
Building a Strong Foundation for Your Cloud with Identity Management
Building a Strong Foundation for Your Cloud with Identity ManagementBuilding a Strong Foundation for Your Cloud with Identity Management
Building a Strong Foundation for Your Cloud with Identity Management
 
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance MandatesSecure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
 

Viewers also liked (8)

Barcelona City Council
Barcelona City CouncilBarcelona City Council
Barcelona City Council
 
MST
MSTMST
MST
 
Bellevue Group
Bellevue GroupBellevue Group
Bellevue Group
 
CAME Group Spa
CAME Group SpaCAME Group Spa
CAME Group Spa
 
DVB Bank
DVB BankDVB Bank
DVB Bank
 
Costruzioni Elettroniche Industriali Automatismi (CEIA) case study
Costruzioni Elettroniche Industriali Automatismi (CEIA) case studyCostruzioni Elettroniche Industriali Automatismi (CEIA) case study
Costruzioni Elettroniche Industriali Automatismi (CEIA) case study
 
WWF- Cisco
WWF- CiscoWWF- Cisco
WWF- Cisco
 
Cable & Wireless- Cisco
Cable & Wireless- CiscoCable & Wireless- Cisco
Cable & Wireless- Cisco
 

Similar to Noble Foods- Cisco

Fy11 Clearswift Corporate Presentation
Fy11 Clearswift Corporate PresentationFy11 Clearswift Corporate Presentation
Fy11 Clearswift Corporate Presentationrichard_turner
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinCloud Expo
 
CYBER-i Corporate Dossier
CYBER-i Corporate Dossier  CYBER-i Corporate Dossier
CYBER-i Corporate Dossier AGC Networks Ltd
 
Industrial Networking Systems Secure Integration | Cisco & Polestar Case Study
Industrial Networking Systems Secure Integration | Cisco & Polestar Case StudyIndustrial Networking Systems Secure Integration | Cisco & Polestar Case Study
Industrial Networking Systems Secure Integration | Cisco & Polestar Case StudyPolestar IIoT
 
ScanTech Food Safety 2.0
ScanTech Food Safety 2.0ScanTech Food Safety 2.0
ScanTech Food Safety 2.0scan15
 
Idexcel Corporate Overview
Idexcel Corporate OverviewIdexcel Corporate Overview
Idexcel Corporate OverviewIdexcel
 
St. Vincents Private Hospital Physical Security
St. Vincents Private Hospital Physical SecuritySt. Vincents Private Hospital Physical Security
St. Vincents Private Hospital Physical Securitynmullen
 
Mtil Corporate 15 07 11
Mtil Corporate 15 07 11Mtil Corporate 15 07 11
Mtil Corporate 15 07 11bhavikmeghani
 
Making Cloud Security Part of Your DNA Webinar Slides
Making Cloud Security Part of Your DNA Webinar SlidesMaking Cloud Security Part of Your DNA Webinar Slides
Making Cloud Security Part of Your DNA Webinar SlidesNetskope
 
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas WespiIT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas WespiIBM Switzerland
 
Kela v2cs -_final
Kela v2cs -_finalKela v2cs -_final
Kela v2cs -_finalwbrewin
 
Watson kista summit 2018 box
Watson kista summit 2018 box Watson kista summit 2018 box
Watson kista summit 2018 box IBM Sverige
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersRishabh Gupta
 

Similar to Noble Foods- Cisco (20)

Fy11 Clearswift Corporate Presentation
Fy11 Clearswift Corporate PresentationFy11 Clearswift Corporate Presentation
Fy11 Clearswift Corporate Presentation
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny Heaberlin
 
CYBER-i Corporate Dossier
CYBER-i Corporate Dossier  CYBER-i Corporate Dossier
CYBER-i Corporate Dossier
 
Industrial Networking Systems Secure Integration | Cisco & Polestar Case Study
Industrial Networking Systems Secure Integration | Cisco & Polestar Case StudyIndustrial Networking Systems Secure Integration | Cisco & Polestar Case Study
Industrial Networking Systems Secure Integration | Cisco & Polestar Case Study
 
ScanTech Food Safety 2.0
ScanTech Food Safety 2.0ScanTech Food Safety 2.0
ScanTech Food Safety 2.0
 
Idexcel Corporate Overview
Idexcel Corporate OverviewIdexcel Corporate Overview
Idexcel Corporate Overview
 
St. Vincents Private Hospital Physical Security
St. Vincents Private Hospital Physical SecuritySt. Vincents Private Hospital Physical Security
St. Vincents Private Hospital Physical Security
 
cloud security ppt
cloud security ppt cloud security ppt
cloud security ppt
 
Cloud Security
Cloud Security Cloud Security
Cloud Security
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Mtil Corporate 15 07 11
Mtil Corporate 15 07 11Mtil Corporate 15 07 11
Mtil Corporate 15 07 11
 
Making Cloud Security Part of Your DNA Webinar Slides
Making Cloud Security Part of Your DNA Webinar SlidesMaking Cloud Security Part of Your DNA Webinar Slides
Making Cloud Security Part of Your DNA Webinar Slides
 
Kela
Kela Kela
Kela
 
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas WespiIT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
 
Kela v2cs -_final
Kela v2cs -_finalKela v2cs -_final
Kela v2cs -_final
 
Watson kista summit 2018 box
Watson kista summit 2018 box Watson kista summit 2018 box
Watson kista summit 2018 box
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
 
Advance Group
Advance Group Advance Group
Advance Group
 
Logicalis BYOD Briefing
Logicalis BYOD BriefingLogicalis BYOD Briefing
Logicalis BYOD Briefing
 
Security Chat 5.0
Security Chat 5.0Security Chat 5.0
Security Chat 5.0
 

More from Cisco Case Studies (20)

Expo Milan 2015 Case Study_EN
Expo Milan 2015 Case Study_ENExpo Milan 2015 Case Study_EN
Expo Milan 2015 Case Study_EN
 
Expo Milano 2015 Case Study_IT
Expo Milano 2015 Case Study_ITExpo Milano 2015 Case Study_IT
Expo Milano 2015 Case Study_IT
 
Seeberger
Seeberger Seeberger
Seeberger
 
Neotel
Neotel Neotel
Neotel
 
Il Gruppo Marcegaglia
Il Gruppo MarcegagliaIl Gruppo Marcegaglia
Il Gruppo Marcegaglia
 
Marcegaglia Group
Marcegaglia GroupMarcegaglia Group
Marcegaglia Group
 
SAAOne Case Study: Private cloud for data clearway
SAAOne Case Study: Private cloud for data clearwaySAAOne Case Study: Private cloud for data clearway
SAAOne Case Study: Private cloud for data clearway
 
AASTMT Case Study
AASTMT Case StudyAASTMT Case Study
AASTMT Case Study
 
Bauer
Bauer Bauer
Bauer
 
Universal Motors Agencies
Universal Motors AgenciesUniversal Motors Agencies
Universal Motors Agencies
 
Equitix
Equitix Equitix
Equitix
 
ScanPlus
ScanPlusScanPlus
ScanPlus
 
Odeabank Case Study
Odeabank Case StudyOdeabank Case Study
Odeabank Case Study
 
IBB Energie AG
IBB Energie AGIBB Energie AG
IBB Energie AG
 
Lufthansa Case Study
Lufthansa Case StudyLufthansa Case Study
Lufthansa Case Study
 
Schmitz Cargobull
Schmitz CargobullSchmitz Cargobull
Schmitz Cargobull
 
Mankiewicz Gebr & Co
Mankiewicz Gebr & Co Mankiewicz Gebr & Co
Mankiewicz Gebr & Co
 
Lomma Kommun
Lomma Kommun Lomma Kommun
Lomma Kommun
 
Skipton Building Society
Skipton Building SocietySkipton Building Society
Skipton Building Society
 
Anyweb: Enabling IT Teams to Delight End Users
Anyweb: Enabling IT Teams to Delight End UsersAnyweb: Enabling IT Teams to Delight End Users
Anyweb: Enabling IT Teams to Delight End Users
 

Recently uploaded

Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 

Noble Foods- Cisco

  • 1. Multilayered Email and Web Protection Customer Case Study Proactive security solution helps Noble Foods optimise supply chain and IT operations. Challenge EXECUTIVE SUMMARY Noble Foods is the United Kingdom’s largest egg supplier and, following the launch of its Happy Egg brand, the world’s number-one free-range egg producer. With 650 Customer Name: Noble Foods users based across seven divisions, the company’s operations cover the complete Industry: Food Production/Agriculture/Retail hen lifecycle: from breeding and rearing, selling the birds to farms and egg shelling Location: United Kingdom and packing, through to the production of liquid and cooked eggs, hen disposal, and milling. Company size: 1800 employees This success has been achieved largely through a sustained program of Challenge organic growth and acquisitions. For example, Noble continues to diversify into • Reduce spam levels without delaying legitimate email value-added fresh food categories by investing in dessert companies with attractive growth potential. • Promote safer web and email behavior across company With operations spread across 42 sites throughout England, Scotland, Wales, and France, the company relies heavily on its Cisco IP network to optimize all points Solution of its supply chain with effective communications and, in particular, an efficient • Intelligent pre-gateway filtering solution, based on the Cisco IronPort Email and Web email system. Security Appliances integrated with the “We centralized IT around four years ago and run all our operations out of a central Sawmill Enterprise 5 Reporting tool data center using Citrix technology to deliver applications over a Cisco MultiProtocol Results Label Switching (MPLS) network,” says Ben Gordon, IT Infrastructure Manager for • Over 2 million threats blocked and 99.3 Noble Foods. percent less spam in first six months • Less risk of delays to legitimate email With malware and spyware attacks on the rise, the company began to experience problems with excessively high levels of bogus emails. “We were receiving upward • 80 percent decline in spam and virus related IT Service Desk calls, releasing IT to focus of 5000 unsolicited emails a day, which created a lot of frustration with users,” more on business enablement projects says Gordon. “To make matters worse, people were also losing legitimate emails, because they contained words and images with pornographic connotations and were, therefore, being incorrectly filtered as spam.” The situation was compounded by three separate antispam and web-filtering solutions. Designed to solve threats as they developed, these entry-level products had been built using various proprietary technologies and open-source software and, as a result, operated in isolation rather than working together as part of one cohesive, enterprise wide security system. “Often we could spend the whole day dealing with spam issues, which for a small IT team serving 650 users was not sustainable,” says Gordon. © 2011 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
  • 2. Customer Case Study “We needed an intelligent Solution pre-gateway filtering The company’s response was to move from a reactive approach that focused solely on containing threats once they had passed through the firewall, to a solution that would make it proactive one that assessed and removed risks, in real-time before they could easier to enforce policies penetrate the network perimeter. and to protect users, “We needed an intelligent pre-gateway filtering solution that would make it easier without being overzealous to enforce policies and to protect users, without being overzealous and bringing and bringing the business the business to a grinding halt,” says Gordon. to a grinding halt.” After extensively researching the market, Noble Foods formed a shortlist headed by Cisco IronPort™ solutions. “IronPort’s reputation, plus the fact that they were Ben Gordon now part of Cisco, effectively offered two market leaders for the price of one,” IT Infrastructure Manager says Gordon. “Even so, we were still looking for candid advice rather than just a Noble Foods sales team simply looking to close a deal.” Cisco Security assembled a team of network, email, and web security experts, who worked closely with Noble’s IT team to identify potential vulnerabilities and scope requirements, before helping to plan, design, and implement the new platform. This advanced security solution, comprising Cisco® IronPort Email Security and Web Security Appliances, allows the company to benefit from the latest advances in threat detection and prevention. These innovations include: • Dynamic Vectoring and Streaming engine: a revolutionary scanning tool for signature-based spyware and malware filtering • Cisco Security Intelligence Operations (SIO): a combination of threat telemetry, a team of global research engineers, and sophisticated security modeling. SIO also includes SenderBase: a threat-tracking database that captures Internet traffic patterns and data from over 100,000 organizations worldwide • Pre-eXecution Environment (PXE) technology: industry-leading email encryption for helping ensure secure messaging compliance and regulatory requirements. As the project progressed, its focus widened when Noble’s HR department saw an opportunity to improve monitoring and governance of web usage across the company. Taking these new requirements, Cisco Security was able to integrate the Sawmill Enterprise 5 Reporting tool with the new security platform. As well as providing the ability to restrict inappropriate emails and visits to specific websites, the solution empowers HR to set up their own automated reports, drill down, and take appropriate corrective action. “For such a high-profile project, the migration was remarkably smooth and largely invisible to end users,” says Gordon. “Best of all, because the Cisco Security solutions are simple ‘plug and play,’ they required minimal configuration and maintenance.” Results Implementing the Cisco Security solutions has enabled Noble Foods to strengthen its web and email defences in a number of ways. Suspicious traffic and potential threats are now automatically intercepted in the cloud before they can reach the desktop. This proactive approach is supported by the SIO, which receives over 30 billion queries daily and increases malware catch rates by more than 20 percent over signature-based scanning-only products. In the first six months, Noble isolated over 2 million malicious threats and cut spam levels by 99.3 percent. © 2011 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.. Page 2 of 3
  • 3. Customer Case Study “Calls to our IT Service Employees are more aware of their responsibilities for safe Internet use. IT security Desk have dropped by policy has been underpinned by the ability to easily and rapidly block websites frequently targeted by malware and spyware producers. “The Cisco IronPort solution 80 percent. Overall, we gives us much greater control,” says Gordon. “For example, remote workers at a hardly spend anytime production site can use PCs located in the Internet cafe during their breaks. The fire-fighting security system will let them visit certain social networking sites during specific hours, but problems, which means prevents the use of bandwidth-hungry video flash games, thereby protecting the we can concentrate on 6Mbps network link.” planning and delivering There is now less risk of legitimate email that could contain customer orders, projects that will add breeder data, agreements, or documentation ending up in quarantine. increased value to the “We’ve seen a 75 percent reduction in false positives, which are instances when business.” the scanner incorrectly thinks it has found a specific vulnerability,” says Gordon. “In layman’s terms, this means more ‘good’ email is getting through the system, which means our supply chain can function more effectively and efficiently. If there are any Ben Gordon IT Infrastructure Manager problems, our system even flags these to our users who are empowered to release Noble Foods certain types of mail themselves.” The project has also been good news for Noble’s IT team. “Calls to our IT Service Desk have dropped by 80 percent,” says Gordon. “Overall, we hardly spend anytime fire-fighting security problems, which means we can concentrate on planning and delivering projects that will add increased value to the business.” Next Steps Noble Foods is already looking to enhance operations and simplify IT further still. As part of a phased approach, the company plans to replace aging private branch exchange (PBX) systems with Cisco IP Telephony, initially at its larger sites. The project is expected to improve collaboration and productivity, while saving money on calls and maintenance. PRODUCT LIST Security and VPN • Cisco IronPort C160 Email Security Appliance • Cisco IronPort S160 Web Security Appliance • Web, email, and image analysis licensing Services • Cisco Security Consultancy • Integration with Sawmill Enterprise 5 Reporting tool Americas Headquarters Asia Pacific Headquarters Europe Headquarters Cisco Systems, Inc. Cisco Systems (USA) Pte. Ltd. Cisco Systems International BV Amsterdam, San Jose, CA Singapore The Netherlands Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco Website at www.cisco.com/go/offices. Cisco and the Cisco Logo are trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and other countries. A listing of Cisco's trademarks can be found at www.cisco.com/go/trademarks. Third party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1005R) © 2011 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.. Printed in the UK ES/11587/0611 Page 3 of 3